Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things (English)
- New search for: Lee, Tian-Fu
- New search for: Chen, Wei-Yu
- New search for: Lee, Tian-Fu
- New search for: Chen, Wei-Yu
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
-
Contributors:Lee, Tian-Fu ( author ) / Chen, Wei-Yu ( author )
-
Publication date:2021-01-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 59
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical thingsLee, Tian-Fu / Chen, Wei-Yu et al. | 2021
-
Verifiable and auditable authorizations for smart industries and industrial Internet-of-ThingsFerretti, Luca / Longo, Francesco / Merlino, Giovanni / Colajanni, Michele / Puliafito, Antonio / Tapas, Nachiket et al. | 2021
-
On machine learning effectiveness for malware detection in Android OS using static analysis dataSyrris, Vasileios / Geneiatakis, Dimitris et al. | 2021
-
Introduction to the special issue on privacy and security for location-based services and devicesCalderoni, Luca / Palmieri, Paolo / Patsakis, Constantinos et al. | 2021
-
Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURFAgarwal, Himanshu / Husain, Farooq et al. | 2021
-
ME-Box: A reliable method to detect malicious encrypted trafficXu, Bingfeng / He, Gaofeng / Zhu, Haiting et al. | 2021
-
A novel multiple color image encryption scheme based on algebra M(2, F 2[u]/〈u 8〉) and chaotic mapJahangir, Saira / Shah, Tariq et al. | 2021
-
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image WatermarkingWang, Xiaochao / Ma, Ding / Hu, Kun / Hu, Jianping / Du, Ling et al. | 2021
-
Bit-wise cryptanalysis on AND-RX permutation Friet-PCIto, Ryoma / Shiba, Rentaro / Sakamoto, Kosei / Liu, Fukang / Isobe, Takanori et al. | 2021
-
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSIGupta, Rajesh / Tanwar, Sudeep / Kumar, Neeraj et al. | 2021
-
A novel hybrid permutation substitution base colored image encryption scheme for multimedia dataNaseer, Yasir / Shah, Tariq / Shah, Dawood et al. | 2021
-
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight clientTosun, Tolun / Savaş, Erkay et al. | 2021
-
A fuzzy Dempster–Shafer classifier for detecting Web spamsChatterjee, Moitrayee / Namin, Akbar Siami et al. | 2021
-
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehiclesEddine, Merzougui Salah / Ferrag, Mohamed Amine / Friha, Othmane / Maglaras, Leandros et al. | 2021
-
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactionsBisogni, Carmen / Iovane, Gerardo / Landi, Riccardo Emanuele / Nappi, Michele et al. | 2021
-
An ensemble classification-based approach to detect attack level of SQL injectionsKasim, Ömer et al. | 2021
-
Editorial Board| 2021
-
Secure facial recognition in the encrypted domain using a local ternary pattern approachKhan, Faraz Ahmad / Bouridane, Ahmed / Boussakta, Said / Jiang, Richard / Almaadeed, Somaya et al. | 2021
-
Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategyPatidar, Arpita / Somani, Gaurav et al. | 2021
-
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)Ren, Yanzhen / Cai, Sen / Wang, Lina et al. | 2021
-
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networksQureshi, Kashif Naseer / Alhudhaif, Adi / Shah, Adeel Abass / Majeed, Saqib / Jeon, Gwanggil et al. | 2021
-
Optimization and implementation of the number theoretic transform butterfly unit for large integer multiplicationHua, Siliang / Zhang, Huiguo / Zhang, Jingya / Wang, Shuchang et al. | 2021
-
A secure end-to-end verifiable e-voting system using blockchain and cloud serverPanja, Somnath / Roy, Bimal et al. | 2021
-
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcementChen, Peng / Han, Dezhi / Weng, Tien-Hsiung / Li, Kuan-Ching / Castiglione, Arcangelo et al. | 2021
-
Malware classification and composition analysis: A survey of recent developmentsAbusitta, Adel / Li, Miles Q. / Fung, Benjamin C.M. et al. | 2021
-
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywordsMohd Kamal, Ahmad Akmal Aminuddin / Iwamura, Keiichi et al. | 2021
-
A secure medical image transmission scheme aided by quantum representationJanani, T. / Brindha, M. et al. | 2021
-
Reliable file transfer protocol with producer anonymity for Named Data NetworkingFan, Chun-I / Karati, Arijit / Yang, Pei-Shan et al. | 2021
-
Secure cloud-of-clouds storage with space-efficient secret sharingNiknia, Ahad / Correia, Miguel / Karimpour, Jaber et al. | 2021
-
A distributed security tomography framework to assess the exposure of ICT infrastructures to network threatsBrignoli, M.A. / Caforio, A.P. / Caturano, F. / D’Arienzo, M. / Latini, M. / Matta, W. / Romano, S.P. / Ruggiero, B. et al. | 2021